sandip's blog

Rescued with Linux !!

Ever been caught without that rescue disk, thinking that everything was lost? Well, then, it's tomsrtbt to the rescue! Works with Linux and Windows, too! Read more here.

Last weekend, the auto-update on Windows XP completely corrupted the OS and the box went into a frenzy reboot cycle. There was no way to boot up in windows, even with a boot/rescue disk. I used "MandrakeMove", a complete OS on a single CD. This automatically recognized the Windows OS and mounted it to "/mnt/windows" and also recognized my external Iomega CD Writer. From this point on, I backed up everything from the home directory on Win OS, formatted and installed Linux...

Windows XP Internet Connection Sharing with Linux

On the XP box, you need to enable Internet Connection Sharing. This should be in your network connections, and probably in the properties of your Dial Up connection. Once this is done, then you need to make sure that both computers have network cards installed and working. After enabling ICS, it should set your Network card to a static IP address of 192.168.0.1 . This is a private IP (doesn't get routed over the internet) and is used for internal networks.

The next step is to configure your linux box. You need to have router or a share hub, but if you only have 2 computers and wanted to connect them up and share the internet connection, you need to use the twisted/cross cable to connect them up. Then configure the network information as follows:

IP Address: 192.168.0.x (where x is any number between 2 and 254)
Subnet Mask: 255.255.255.0
Gateway: 192.168.0.1

The gateway is very important as it tells the linux how to find the route through to the internet.

Support Tickets Manager

Triangle Solutions Ltd presents PHP Support Tickets. A Simple, Secure & Powerful solution to customer relations.

Image Gallery Management System

4images is a powerful web-based image gallery management system. Features include comment system, user registration and mangagement, password protected administration area with browser-based upload, HTML templates for page layout and design, search engine and a lot more. 4images is free for private and non-commercial use.

Resources For High-technology Entrepreneurs

The STVP Educators Corner is a free online archive of entrepreneurship resources for teaching and learning in engineering and the sciences. The mission of the project is to support and encourage faculty around the world who teach entrepreneurship to future scientists and engineers.

Perl Compatible Regular Expressions Manual

PCRE was originally written for the Exim MTA, but is now used by many high-profile open source projects, including Python, Apache, PHP, KDE, Postfix, Analog, and nmap. Other interesting projects using PCRE include Ferite, Onyx, Hypermail, and Askemos.

Get rid of those Banner Ads and increase your browsing speed ;-)

If you're looking to block online site ads and offensive Web content, you don't need to buy special software. Instead, you can use the HOSTS file built into Windows.

Few web sites host their own banner ads. Typically they sign up with ad servers that deliver content and track views and clicks. Thus you can block most web site ads by blocking a fairly limited number of ad servers. HOSTS files can block web ads by blocking access to these ad servers. Similarly, you can also block other sites serving objectionable content.

What Is the HOSTS File?

Unless a computer is configured to use a proxy server, the HOSTS file is the first place a browser looks for an IP address when you type in a URL such as www.permutations.com. Only if the domain name is not found in the HOSTS file does the browser then query the DNS server. It is this fact that makes the HOSTS file an effective means for blocking web site ads.

Visual C++ Tutorial

Author: Brian Martin

Lesson 1: Behind the scenes, Handles and Messages

Though you think you want to dive right into the code, you really don't. Windows programming is overwhelming at first. Let's take a quick look at how Windows works. The backbone of all of your programming will be responding to and sending messages. What are messages? Messages are simply a 32bit number designating some event. Example: You move the mouse, a message (defined as WM_MOUSEMOVE) is 'posted' to the active window. You press a key, a message (WM_KEYDOWN) is 'posted' to the active window. You resize the window, a message (WM_SIZE) is 'posted' to the active window. Get the picture?

Keeping Fedora upto date with Yum !

Written by Rick Nicholas

Yum is an automatic updater and package management tool for rpm based systems. Yum automatically computes dependencies and figures out what steps need to occur in order to install packages. It makes it much easier to maintain groups of machines without having to manually update each one using rpm.

Yum can be used in place of, or in addition to the Red Hat up2date and rpm tools which also come with Fedora Core 1. My personal preference is to use Yum as a complete replacement for both tools as it has proven to be faster, more reliable, and also offers functionality not available when using the other tools such as;


  • Multiple Repositories

  • Simple Configuration File

  • Correct Dependency Calculation

  • rpm-consistant behavior

  • comps.xml group support, including multiple repository groups

  • Simple interface

Yum can not only be used to keep packages already installed on your system updated, but can also be used to install packages directly, which is awesome on those days when you can't find a cd to save your life. Yes, you could always download the sourceball, or go looking for an rpm on the net, but this is soooo much simpler. Yum is developed and maintained through the hard work of the folks at Duke University and is made available to the rest of us under the GNU GPL. So now you know a little about Yum, lets check out what it can do for you !

Google Plus E-Mail Equals Gmail

Google plans to offer an e-mail service, called Gmail that would give account owners 1GB of free storage. Gmail would also offer search capabilities allowing users to find specific pieces of information buried within tens of thousands of e-mails. Read more...

Syndicate content
Comment